StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Forensics Assignment 2 - Essay Example

Cite this document
Summary
Those include hardware and software to conduct the investigations and data storage. Remarkably, it is imperative to ensure the lab is safe and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Computer Forensics Assignment 2
Read Text Preview

Extract of sample "Computer Forensics Assignment 2"

Computer Forensics Assignment 2 Computer Forensics Assignment 2 Equipment and Software to Purchase A computer forensics lab shouldhave fundamental requirements for conducting investigation and ensuring safe storage of evidence. Those include hardware and software to conduct the investigations and data storage. Remarkably, it is imperative to ensure the lab is safe and productive. To ensure security, the following equipment’s should exist. There should be a safe to serve as a secure container.

An example of a secure safe is a heavy-duty cabinet. It should be under regular lock and only accessible to authorized staff serving at the lab. It is necessary to purchase equipment that are necessary to set up a TEMPEST-qualified lab. That demands setting up evidence storage container or lockers. Such lockers ensure security of evidence stored and restricted access by authorized staff. Locks installed should be of high quality and have limited possibilities of distribution of duplicate-keys.

Source: EC-Council (2009)Evidence storages should be subject to regular inspections to ensure only current evidence are kept therein and closed cases’ evidence are relocated to secure locations in an off-site facility. The evidence container should be in a position restricted to authorized staff members and the number of people granted access should be minimum. Furthermore, only authorized staff members should inspect lock combinations. In case the investigations use intel-based PCs, computers are necessary.

There is need to acquire the right Operating Systems (OS) and other applications. Computer forensics software package should form part of the software acquired (Nelson, Phillips & Steuart, 2009). Specialized software are similarly important. They include software such as Peachtree. Disk-editing software are also necessary for evidence analysis (Nelson, Phillips & Steuart, 2009). Source: EC-Council (2009)Documenting the crime scene and collect and package the evidenceComputers may contain incriminating evidence including DNA but professional curiosity has a potential to destroy evidence.

It is, therefore, imperative to properly document, collect and package the evidence from a crime scene. The U.S DOJ standards for seizing digital evidence are applicable (The Office of Legal Education, 2011). In the case of a drug dealer’s computer, the following process should be applicable. The investigator should seize the computer together with other peripherals found at the scene. Peripherals include cell phones, scanners and cameras. Printers CDs, DVDs and USB devices should also be seized.

Source: Department of Justice (2008)Source: Department of Justice (2008)After that, the investigators should recognize information that can serve as evidence from the scene of crime. The next stage is to document the evidence collected from the scene. Collect the computer document that exists in the storage devices. E-mails, texts and internet histories form a great part of the information that should be collected during the investigations (NFSTC, 2010). Online-based backup systems are valuable sources of information that are important during investigations (Taylor et al., 2010). The DSL connection should, as well, be documented during the time of evidence collection.

In an attempt to avoid alteration of data, it is imperative to document all activities that were occurring in the computer at the time of collecting evidence. Photographs of the computer should be taken to show the state it was found at the time of evidence collection. All evidence collected from the scene should be in safe custody and handled by professionals. ReferencesEC-Council (2009). Computer Forensics: Investigation Procedures and Response. Clifton Park, NY: Cengage Learning.National Forensic Science Technology Center (NFSTC). (2010). A Simplified Guide to Digital Evidence.

Retrieved May 25, 2015 from http://www.crime-scene-investigator.net/SimplifiedGuideDigitalEvidence.pdfNelson, B., Phillips, A., & Steuart, C. (2009). Guide to computer forensics and investigations. Cengage Learning.Taylor, M., Haggerty, J., Gresty, D., & Hegarty, R. (2010). Digital evidence in cloud computing systems. Computer Law & Security Review, 26(3), 304-308.The Office of Legal Education (2011). Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Retrieved May 25, 2015 from http://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdfU.S.

Department of Justice. (2008, April). Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. On Demand Publishing, LLC-Create Space.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1695924-computer-forensics-assignment-2
(Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 Words)
Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1695924-computer-forensics-assignment-2.
“Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1695924-computer-forensics-assignment-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Forensics Assignment 2

Ballistics Forensic Technology

In the paper “Ballistics – Forensic Technology” the author focuses on the science which is important for soldiers, law enforcement, hunters, and anyone who seeks to protect their life, their home, and their family.... Ballistics is the science of mechanics that deals with the motion....
3 Pages (750 words) Assignment

Computer Questions Final

CRT is the imaging technology used in most desktop monitors also provides an excellent color display.... It is not completely supplanted as it is extremely bulky and is now being gradually supplanted by TFT. Code 39 (also called Code 3 of 9) is an easy-to-print barcode commonly used for various bar-coding labels such as name badges, inventory and industrial applications....
5 Pages (1250 words) Assignment

Computer Science Assignment

The paper "computer Science Assignment" tells us about planning and analysis of Decker Repairs.... hellip; It explores in to identifying opportunities to improve the present situation and suggests a suitable computer Information system required to envelope all the deficiencies with the present system....
9 Pages (2250 words) Assignment

The Future of Policing in America

The information contained in Electronic Crime Scene Investigation-A Guide for First Responders (available free of charge and downloadable from the Department of Justice) helps line cops solve crimes that are computer-related.... Step by step it explains the basic workings of the computer and provides the names of the various parts that make it work.... The book explains and identifies the various parts of the computer that should be identified by law enforcement as possible evidence of various electronic criminal acts....
4 Pages (1000 words) Assignment

Qualitative Research in the Field of Forensics

The author of the paper examines and analyzes qualitative research which plays a very important role in the field of forensics.... It is through extensive research that those in the field of forensics use nothing but the best to complete their tasks.... forensics and other professionals could use this information to further develop much better tools for measuring people and determining their personality types, bypassing when they might fake who they are in order to influence their fate, especially if they should be the ones who have committed the crime....
6 Pages (1500 words) Assignment

Computer Sciences and Information Technology

What if someone else handle the computer?... Well, nowadays computer technology provides solution to every… The S-Tool Application is software that helps to hide information in an image.... The information is saved in the image files of Thorn's computer files but the passphrase is not yet found....
3 Pages (750 words) Assignment

4th Admendment Issue: Computer Forenics Analysis of Thumb Drive

The loss of evidence may compromise the integrity and quality of service the police department computer Forensic Analysis of Thumb Drive computer Forensic Analysis of Thumb Drive The fourth amendment is a clause in the AmericanConstitution outlaws unreasonable searches....
1 Pages (250 words) Assignment

How Visual-Based Search Can Be Obtained Using Matlab Programme

… AbstractThis lab experiment seeks to illustrate how visual-based search can be obtained using matlab programme.... It outlines the stepwise development of an improved matlab code that searches through a base of images and matches the images in the order AbstractThis lab experiment seeks to illustrate how visual-based search can be obtained using matlab programme....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us